part 5, IT and the law Flashcards
this is an E.Ulaw that came into force in 2014 and allows individuals to have personal data about them removed from search engines if it is untrue or no longer relevant
what is the
right to be forgotten
this allows:
- Unauthorized access to a database
- Viewing restricted content of a database
- Changing or deleting the contents of the database
- reconnoitre a site before performing a serious attack
what 4 actions does an
SQL injection (SQLi)
allow
Section 171(1) of the General Data Protection egulation (GDPR) may allow this if:
- with a view to testing the effectiveness of the de-identification of personal data,
- without intending to cause, or threaten to cause, damage or distress to a person, and
- in the reasonable belief that, in the particular circumstances, re-identifying the information was justified as being in the public interest.
under which 3 circumstances would Section 171(1) of the General Data Protection egulation (GDPR) allow for the
de-anonimisation of anonimised data
talk talk were attacked in july, september and october of 2015
in 2015 which months were talk talk attacked
this section is concerned with
unauthorised access intending to commit or assist the commission of further offences
what is
section 2 of the Computer Misuse Act (CMA) 1990
concerned with
what is a
query string
this is part of a websites Uniform Resource Locator (URL). it does not determine the address of the web page but instead is a method of transmitting data. for example from a web form to a server
from this company attackers stole:
- 157,000 customer accounts were stolen, including information such as names and addresses, dates of birth, email and telephone details, as well as account information
- attackers stole complete bank or credit card records belonging to 16,000 customers
- partial banking details of a further 28,000 customers
in october 2015 what
data was stolen from talk talk
what are the two
overriding provisions
of the
General Data Protection Regulation (GDPR)
these include:
- Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection or appropriate safeguards for the rights and freedoms of data subjects in relation to the processing of personal data; or there are special circumstances meaning the transfer is necessary.
- Personal data shall be processed in accordance with the rights of data subjects i.e. there must be respect for fundamental rights.
(Open University, 2022)
what did the
Data Protection Act 1998
introduce / acknowledge
this piece of legislation explicitly acknowledges the privacy rights of individuals.
access to this was provide through a terminal that cost £650 with that you would also have to pay for a quarterly subscription of £5 and a 5p page per view during peak hours
how could you gain access to the
prestel service
what is
Section 3a of the Computer Misuse Act (CMA) 1990
This is an amendment that has been made and states that it is a criminal act to develop or supply either software or data that may be used in a crime
to be charged under this it must be proven that:
- The prosecuted had a desire to perform the crime
- The prosecuted took action to perform the crime
example
gaining access where you shouldnt have by accident means that you have met criteria 2 but have not met criteria 1, therfore you cannot be charged under this act
similarly if you plan an attack you have met criteria 1 but until action is taken criteria 2 you cannot be charged under this act
which two criteria must be met in order to be sentenced under the
Computer Misuse Act (CMA) 1990
YES
under Section 171(1) of the law states:
“It is an offence for a person knowingly or recklessly to re-identify information that is de-identified personal data without the consent of the controller responsible for de-identifying the personal data”
does the General Data Protection Regulation (GDPR)
prohibit the act of de-anonimizing data that has been anonimised
such as pseudonymisation data
some knowledge an attacker may gain from using these are:
- which querys were successfully executed
- which tables do/do not exist
- what data does/does not exist
what knowledge could an attacker gain from your database by
receiving error messages
during an SQL injection (SQLi) attack
how do
databases allow webpages to be dynamic in nature
and at the same time avoids creating millions of different web pages for each user
a web page can usually be implemented as a template which can
have data entered into it depending on the situation such as who is logging in
what happens when
restrictions are placed on query strings
to prevent an SQL injection (SQLi) attack
when taking this action the script that tuns query strings into queries will ensure that it only accepts:
- queries with a fixed amount of parameters
- Queries with parameters of certain types
Example
If the script only expects two parameters (name and date) and those parameters must be formatted a certain way or be a certain type then any other query strings that it encounters will be discarded and not passed to the database
how can
Principle 6, Integrity and confidentiality (security)
of
article 5, General Data Protection Regulation (GDPR)
Data Protection Principles
be described / summarised
this can be described / summarised as:
The sixth data protection principle is that personal data processed for any purposes must be so processed in a manner that ensures appropriate security of the personal data, using appropriate technical or organisational measures (and, in this principle, “appropriate security” includes protection against unauthorised or unlawful processing and against accidental loss, destruction or damage). (Open University, 2022)
what is the
computer misuse act (CMA) 1990
concerned with
this act is concerned with unautharised access or modification to a computer as well as any crimes carried out with a computer and/or threats to life through use of a computer
in the U.K this position is taken by the
Information Commissioner’s Office (ICO)
general data potection regulation (GDPR) ensures that each member state has a supervisory authority (SA) which oversees data protection
what is the name of the
U.Ks supervisory authority (SA)
- their profits halved
- they spent £60 million upgrading their systems
- their shares dropped
- 101,000 customers were lost in the 3 months following the attack
- they were fined £400,000 for being in breach of the data protection act (DPA) 1998
in the aftermath of the october 2015 attack on talk talk what were the implications for the company
what does
subsection 2(5) of the Computer Misuse Act (CMA) 1990
state
this lists punishments under section 2 and states that there is an up to 5 year pison sentence for most serious crimes. It also states that you can be charged with additional offences as well as section 2 such as when you commit theft
this type of conviction is whee a jury will be involved in the case
what is a
conviction of indictment
what is a
conviction of indictment
this type of conviction is whee a jury will be involved in the case
what is
Section 3za of the Computer Misuse Act (CMA) 1990
This is another amendment which has been made to the Computer Misuse Act (CMA) 1990. it covers the most serious of computer crimes where human life has been has been harmed such as:
- Disrupting food,water or energy supplies
- Disrupting communication or transport networks
- Damage or disrupt healthcare
what does
subsection 2(2) of the Computer Misuse Act (CMA) 1990
state
This lists the types of crimes covered by section 2 such as: fraud, forgery, theft and criminal damage
how does
turning off error messages
help prevent an SQL injection (SQLi) attack
the reason this prevent an SQL injection (SQLi) attack is because an attacker can use these to gain a better understanding of the structure of your database
what 3 purposes does the
Geneal Data Protection Regulation (GDPR)
serve
this:
- Provide a set of rules concerning data that would be enforced by every E.U member state. This makes doing business much easier in cases where data processing of a certain type would have been illegal in one country but not another
- protects the data of EU citizens by place responsibility of protecting that data on to companies.
- protects EU citizens data even when it is not being processed in the EU since the law extends to any country processing EU citizens data
name 5 requirements that the
General Data Protection Regulation (GDPR)
places on developers / companies
this requires that:
- developers to think about the privacy of users data from the outset not just when the system is finished
- companies process as little data as possible
- companies only collect what they need to complete the task
- personal data is deleted when no longer needed
- data may not be passed to other organisations without permission
by taking this action on a database:
- it makes it harder for an attacker to understand the structure of your database
- it increases the likeelihood that the attacker will be caught before carrying out a real attack
how does
turning of database error messages
make it harder for an attacker to perform an SQL injection (SQLi) attack
this term covers any of the following acts:
- Collecting new data
- Using existing data
- Sharing data
- Disclosing or displaying data
- Data storage
- Data disposal
according to the Data Protection Act (DPA) what does the term
data processing
encompass
when this occurs within the query string they are separated by ampersands (&)
if
multiple parameters and their values are contained within a query string
how are they separated
for you to be charged with this section some actions might be:
- Denial of service
- Introducing malware
name two actions taken on a computer that would be chargeable under
Section 3 of the Computer Misuse Act (CMA) 1990
this is part of a websites Uniform Resource Locator (URL). it does not determine the address of the web page but instead is a method of transmitting data. for example from a web form to a server
what is a
query string
what are the 7
Data Protection Principles
included in article 5 of the General Data Protection Regulation (GDPR)
this includes:
- Lawfulness, fairness and transparency
- Purpose limitation
- Data minimisation
- Accuracy
- Storage limitation
- Integrity and confidentiality (security)
- Accountability
what is
section 1 of the Computer Misuse Act (CMA) 1990
concerned with
this section is concerned with
unauthorised access to computer material
this piece of legislation explicitly acknowledges the privacy rights of individuals.
what did the
Data Protection Act 1998
introduce / acknowledge
this is a type of attack where an attacker does not know the structure of your database. instead they issue querys in hope that they will be executed by the database.
what is
blind injection
in the aftermath of the october 2015 attack on talk talk what were the implications for the company
- their profits halved
- they spent £60 million upgrading their systems
- their shares dropped
- 101,000 customers were lost in the 3 months following the attack
- they were fined £400,000 for being in breach of the data protection act (DPA) 1998
what must organisations adhere to in order to remain complient with the General Data Protection Regulation (GDPR)
in order to remain complient with this they must adhere to the seven core
Data Protection Principles of article 5
to be charged under this section:
- the user intends to gain access to the computer; and
- they are not authorised to do so; and
- they are aware that their actions are not authorised by the computer’s owner.
what 3 criteria must be met to be
charged with section 1 of the Computer Misuse Act (CMA) 1990
how does
turning of database error messages
make it harder for an attacker to perform an SQL injection (SQLi) attack
by taking this action on a database:
- it makes it harder for an attacker to understand the structure of your database
- it increases the likeelihood that the attacker will be caught before carrying out a real attack
to protect this type of data:
- Encrypt data
- Seperate this data from the algorithm
- Seperate this data from the data it was created from
what measures should be taken to protect
Pseudonymisation data
if an organisation in the U.K breaches the General Data Protection Regulation (GDPR) this body may:
place punishments of €20 million or 4% of an organisation’s total worldwide annual turnover of the preceding financial year, whichever is higher. For not complying with this law
if someone in the U.K is in breach of the General Data Protection Regulation (GDPR) what is the maximum punishment that can be placed on an organisation by the
Information Commisionoers Office (ICO)
how could you gain access to the
prestel service
access to this was provide through a terminal that cost £650 with that you would also have to pay for a quarterly subscription of £5 and a 5p page per view during peak hours
this type of conviction is where no jury is involved in the sentencing instead only a judge or majistrate handles the case
what is a
summary conviction
the worst attack that talk talk saw in 2015 was in october
which month of 2015 saw the hardest hitting attack on talk talk
this can be described / summarised as:
Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. Appropriate time limits must be established for the periodic review of the need for the continued storage of personal data for any purposes. (Open University, 2022)
how can
Principle 5, Storage limitation
of
article 5, General Data Protection Regulation (GDPR)
Data Protection Principles
be described / summarised
to prevent an
error-based SQLi
what 3 actions can be taken
to prevent this the following can be implemented:
- Ideally error messages are turned off entirely for a public facing database
- error messages are logged to a local file for public facing database
- srror messages are only to be used for offline development of a database
what content did prestel deliver to its subscribers
this delivered to its subscribers:
- news, train times, etc
- the first email service in the ukintroduced the worlds first online 3.
- banking service through the Bank of Scotland and the Nottingham Building Society
- It also introduce the worlds first online theatre ticket purchase and grocerry shopping
how can
Principle 3, Data minimisation
of
article 5, General Data Protection Regulation (GDPR)
Data Protection Principles
be described / summarised
this can be described / summarised as:
Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. (Open University, 2022)
what is
blind injection
this is a type of attack where an attacker does not know the structure of your database. instead they issue querys in hope that they will be executed by the database.
this also introduced into U.K law
- relations to national security
- duties of the Information Commissioner’s Office (ICO)
- EU Data Protection Directive 2016/680 (Law Enforcement Directive)
the
Data Protection Act (DPA) 2018
introduces europes general data protection regulation (GDPR) but what 3 other things did it incorporate into law
this works by replacing a legitimate query string with one that is malicious
how does an
SQL injection (SQLi) attack
work
this is a process that is implemented in order to protect the real identity of an individual
example
Henry has Type 1 diabetes
Patient 37815 has Type 1 diabetes
what is
Pseudonymisation
what is a
query language
this is a specialised language that is used to communicate with databases. the most common is Structured Query Language (SQL)
what is
Pseudonymisation
this is a process that is implemented in order to protect the real identity of an individual
example
Henry has Type 1 diabetes
Patient 37815 has Type 1 diabetes
what are 2 methods that can be taken to
sanitise query strings
and prevent an SQL injection (SQLi) attack
2 methods that can be used to implement this are:
- restricting query strings
- parsing query strings
in order to remain complient with this they must adhere to the seven core
Data Protection Principles of article 5
what must organisations adhere to in order to remain complient with the General Data Protection Regulation (GDPR)
2 methods that can be used to implement this are:
- restricting query strings
- parsing query strings
what are 2 methods that can be taken to
sanitise query strings
and prevent an SQL injection (SQLi) attack
what does
subsection 2(3) of the Computer Misuse Act (CMA) 1990
state
states that further offences committed after gaining access to the computer (section 1) does not need to happen immediately to be charged. Simply if customer details were stolen and then six months later those details were used to commit faud to those users, you can still be charged.
these include:
- consent - There must be clear and specific, up-front statement of consent on the part of the individual; and specific consent for each use of the data
- contract - one of the options of choice for many large organisations looking to circumvent the consent rules.
- Legal obligation - e.g. the organisation may need to process the data to comply with national security related obligations under a law like the Investigatory Powers Act of 2016.
- Vital interests - e.g. processing the data to protect someone’s life.
- Public task - e.g. duties carried out by a public authority in the public interest.
- Legitimate interests – the Information Commisioners Office (ICO) describes this as “the most flexible lawful basis for processing… where you use people’s data in ways they would reasonably expect and which have a minimal privacy impact”.
what are the six
lawful bases upon which the Data Protection Act (DPA) 2018 allows organisations to process data
the reason this prevent an SQL injection (SQLi) attack is because an attacker can use these to gain a better understanding of the structure of your database
how does
turning off error messages
help prevent an SQL injection (SQLi) attack
according to section 3(2) of the Data Protection Act (DPA)
what is personal data?
this describes it as
any information relating to an identified or identifiable living individual.
side note
Some observations of this are:
- It does not cover data about dead people
- It does not protect anonymised information
- Does not protect data about pets
- Etc
which two criteria must be met in order to be sentenced under the
Computer Misuse Act (CMA) 1990
to be charged under this it must be proven that:
- The prosecuted had a desire to perform the crime
- The prosecuted took action to perform the crime
example
gaining access where you shouldnt have by accident means that you have met criteria 2 but have not met criteria 1, therfore you cannot be charged under this act
similarly if you plan an attack you have met criteria 1 but until action is taken criteria 2 you cannot be charged under this act
these two journalist were initially found guilty of forgery and counterfeiting
what was
Robert Schifreen and fellow journalist stephen gold
initially found guilty off
this act meant that any public and private companies holding personal data must register with a data protection registrar who also enforced the law, however an individuals right to privacy was not covered by this piece of legislation
what did the
Data Protection Act (DPA) 1984
introduce
in october 2015 talk talk had been a victim of an
SQL injection (SQLi) attack
in october 2015 what type of attack was talk talk subject to
what is the
right to be forgotten
this is an E.Ulaw that came into force in 2014 and allows individuals to have personal data about them removed from search engines if it is untrue or no longer relevant
what was proposed after the appeal ruling of robert shifreen and stephen gold
after the appeal ruling it was proposed by the courts that legislators would have to decide if new laws should be put in place to restrict the act of unauthorised access to a computer
descibe what
sensitive data
is
this is any personal data that could be used against a person for reasons such as:
- discrimination
- persecution because of beliefs or being
because of these reasons there are a wide range of protections in place for this type of personal data
what claim did journalists Robert Schifreen and fellow stephen gold make during their appeal and did the judge agree
the claim that Robert Schifreen and fellow journalist stephen gold made during their appeal was that
the act they were charged under was never meant to be used in such a case as theirs
the judge agreed with this claim and dropped all charges in 1988
because some software can be used in a criminal way but at the same time have legitimate uses such as assesing the security of a system what considerations before being charged with
Section 3a of the Computer Misuse Act (CMA) 1990
have been recommended to asses
Some considerations of using this section are:
- Was the software developed to obtain unauthorised access to a computer? For instance, malware clearly obtains unauthorised access to data.
- Does the software have a legitimate purpose, such as testing a network’s security?
- What was the context in which the software was used to commit the offence, compared with its original intended purpose?
when
restricting permissions
to prevent an SQL injection (SQLi) attack what two actions can be put into place
when using this technique to prevent an SQL injection (SQLi) attack we can:
- restrict what data a web page can see from a database
- restrict what actions a web page can take on a database such as deleting or modifying
restrictions such as these ensures that even if a malicious query string is sent to a server it will never be executed by the database because of the lack of permissions
this will begin after a question mark symbol (?) within the Uniform Resource Locator (URL)
where does a
query string
begin within a
Uniform Resource Locator (URL)